05-10-2023 12:06 PM
I’m currently trying to scan Cisco UCS devices using Nessus Scanner but I’m keep getting non-authenticated scans. Under the scan results I cannot find the Plugin ID 110095, shows as no data. I was able to scan these devices with authenticated scans back to February prior a Firmware update, wondering if the "key exchange algorithms" that Cisco UCS is currently using is no longer supported by the Nessus Scanner. I’m currently getting Intermittent Authentication Failure under Plugin ID 117885, It shows 4 connection timed out or was dropped during key exchange. Please if anybody have any idea will be great and highly appreciated. Thanks.
05-10-2023 12:49 PM
As this has nothing to do with Collaboration, but is related to Data Center, I’ll help you out and move your post into that part of the community.
05-12-2023 09:34 AM
What model (PID) UCS device?
What version (firmware) is on the UCS device?
Could be UCS is old SSH and Nessus is new SSH or vice versa.
This is a semi-common scenario as SSH versions / ciphers / kex / etc change over time and older "insecure" combinations are retired.
If UCS is up to date, then that would be a Nessus problem to fix.
If UCS is old, then upgrading UCS may allow Nessus to connect.
05-12-2023 01:29 PM
Hi, I'm using the following specs
Model: UCS-FI-6332-16UP-U
Firmware Version: 4.2.2d
I was thinking if the algorithm that the UCS devices are using are not longer compatible with Nessus, because I was able to get credentials scans back to February before we update the firmware. Please let me know what do you think about this, thanks.
05-14-2023 07:39 PM - edited 05-14-2023 07:41 PM
I've had a couple of customers have issues with older versions of putty connecting to newer UCSM versions for the reason's Steve's already mentioned (older ciphers being retired), and resolved with newer version of putty.
As UCSM isn't created for "Nessus" functionality, I'd say it's up to Nessus to have up to date ciphers.
UCSM not responding to Nessus isn't a bad thing from UCSM security perspective ; )
Kirk...
05-15-2023 04:34 AM
Hi there and thanks for the input.
Is there a link that contains details about the latest firmware udpate improvements? So I find the specific updated protocol and submit this as final explanation/confirmation. Thank you.
05-15-2023 08:49 AM
General release notes: https://www.cisco.com/c/en/us/td/docs/unified_computing/ucs/release/notes/cisco-ucs-manager-rn-4-2.html
From a wireshark capture for SSH negotiation with a UCSM running 4.22e
diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,!ssh-rsa,rsa-sha2-256,rsa-sha2-512 aes128-ctr,aes192-ctr,aes256-ctr aes128-ctr,aes192-ctr,aes256-ctrhmac-sha2-256,hmac-sha2-512,hmac-sha2-256,hmac-sha2-512,none,zlib@openssh.comnone,zlib@openssh.com
CiscoSSH 1.8.23, OpenSSH_8.0p1, CiscoSSL 1.1.1l.7.2.289-fips
Kirk...
06-27-2024 07:33 AM
I am unable to get credentialed Nessus Security Scans with CP-8832NR VOIP Phones that support SSH and EAP as well. The Tenable and ACAS Nessus User Group response was vague, not one SME said they could get a credentialed scan. I believe this is a Linux or proprietary kernel embedded on the firmware that Tenable Nessus Professional does not support for credentialed scans. If this is the case, if a credentialed Nessus scan of the CUCM software would not produce valid results. I wish the CISCO Applications Engineers would chime in and support the users on this critical security vulnerability issue. A custom use case using CVEs appears to be the best option.
06-27-2024 07:37 AM
I am unable to get credentialed Nessus Security Scans with CP-8832NR VOIP Phones that support SSH and EAP as well. The Tenable and ACAS Nessus User Group response was vague, not one SME said they could get a credentialed scan. I believe this is a Linux or proprietary kernel embedded on the firmware that Tenable Nessus Professional does not support for credentialed scans. If this is the case, if a credentialed Nessus scan of the CISCO Unified Call Manager (CUCM) software would not produce valid results. I wish the CISCO Applications Engineers would chime in and support the users on this critical security vulnerability issue. A custom Test case using Critical Vulnerability Exploits (CVEs) appears to be the best option.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide